Memory Flaws Boot Camp

Denial of service attacks. Data leaks. System crashes. Malicious code execution. All examples of the impact of exploited memory vulnerabilities in your code. As a diligent and security-conscious software developer, you need to arm yourself with the knowledge to defend your code against these issues.

Based on the top memory weaknesses identified by CWE, this no-charge eLearning course will describe the cause and security impact of these flaws, provide technical examples of each and offer strategies to help mitigate the risks they pose.

Share

1 comment

Noticed that in the last few seconds of each segment the speakers diction became blurred, leading to uncertainty about the 'punch line' of the segment. This would inadvertently handicap a hearing-impaired listener, because there are no following sentences that might disambiguate the punch line.
It is relatively common for the last few words of a final sentence to be pronounced with a different inflection. This is a habit started in the Elementary School peer-group and then maintained into adulthood.
A work-round for speakers would be the instruction to repeat the last few words after a brief pause. There are undoubtedly other solutions as well.
Bill Levick